Was this helpful?
Thumbs UP Thumbs Down

AMD Zen CPUs Hit by a Serious Security Flaw

AMD Ryzen processor chip on an ASUS Prime 350 plus
Ryzen 3600 chip

A Sneaky Flaw in Your CPU’s Core

Imagine your computer’s brain had a hidden doorway. Google researchers identified a vulnerability in millions of AMD processors, raising security concerns.

From Zen 1 to Zen 4, these chips have a flaw that allows someone with high-level access to install their microcode updates. Microcode controls how the chip works at its deepest level. This bug doesn’t instantly hand over your system to hackers, but it opens a path for advanced attacks.

Frustrated gamer cover face with hands

Millions of Devices Are Affected

While this issue affects a wide range of devices, exploiting it requires local administrator privileges, mitigating the risk for average users. It might be at risk if you’ve bought a computer with an AMD Ryzen or EPYC chip since 2017.

Zen 1 to Zen 4 chips are found in laptops, desktops, workstations, and game consoles. These chips are everywhere, from students doing homework to businesses handling sensitive data.

Hacker working with his computer infecting servers

What’s in a Name?

The researchers named the bug “EntrySign,” which makes sense when you hear what it does. It allows attackers to enter and sign off on fake microcodes as if they were legit.

This bug lives in the signature check, the chip’s way of saying, “Yes, this update is safe.” However, AMD used a cryptographic method that wasn’t strong enough for the job. That tiny weakness opened the door.

AMD logo displayed on a phone screen

A Public Key That Wasn’t Secret

One of the most surprising parts? AMD used a sample cryptographic key from a public manual. That key came straight from NIST documentation and was never meant for real-world use.

Using this public key made it much easier for Google’s team to figure out how to forge valid signatures. Simply put, it’s like putting a factory reset password on all locks and never changing it.

Hooded hacker hacking

What Hackers Could Actually Do

So, what happens if a hacker gets in? They could load a malicious microcode update that changes how the chip works. That might mean disabling protections or stealing data.

The damage could include breaking the security of virtual machines, faking instructions, or making the chip leak information. But there’s a catch: the attack only lasts until you restart the computer.

That doesn’t mean it’s harmless, though. Even a short window is enough to do real damage in the right hands. And that window can stretch longer than you’d think in systems that don’t reboot often.

Dangerous hooded hacker breaks into government data servers and

This Attack Isn’t Easy to Pull Off

Before you panic, know this: the attack isn’t a walk in the park. It first requires full admin access, which means the attacker already has deep control.

Most malware doesn’t get that far. So, while the vulnerability is serious, it’s not likely to be used in drive-by downloads or phishing emails. It’s more of a tool for advanced attackers, maybe even spying groups or researchers testing limits.

AMD Ryzen processor chip on an ASUS Prime 350 plus

Why This Flaw Still Matters

Even if the attack is hard, the flaw tells a bigger story. It shows that even advanced chips can carry mistakes buried in their design.

When a chip can’t tell the difference between safe and unsafe updates, it risks everything on that system. This kind of bug is a wake-up call for hardware makers. The foundation of computer security starts in the silicon, and if there’s a crackdown, no software update can fully cover it.

Google logo on a building

Google Drops the Zentool Bomb

To show how real the flaw was, Google released a tool called Zentool. It lets users experiment with creating and loading microcode patches.

This tool was designed for researchers to understand better how AMD’s microcode works and to test the limits of EntrySign. But it also means anyone can try it, including people who might not have the best intentions.

Silicon chip on white background

Peeking Inside the CPU Brain

Zentool does more than just load microcode, it lets researchers take apart and analyze it. That’s like getting a manual to the secret language your chip speaks.

It can help security teams determine what instructions do, how they connect, and where things might go wrong. AMD has never made this kind of information public before, so it’s like suddenly turning the lights on in a room that is always dark.

AMD office building

AMD’s Patch Came Quietly

AMD didn’t shout from the rooftops when the bug was fixed. Instead, it released the patch quietly in December 2024, giving time for companies to prepare.

Only later did it publicly confirm the problem. The company wanted customers to update systems before the vulnerability became common knowledge. This is a strategy tech companies often use to fix the issue and then talk about it.

Update screen on a laptop

Updates Are Your Best Defense

To stay protected, users need to update their BIOS and firmware. These aren’t your usual software updates; they change how the chip runs.

Your device’s manufacturer, like Dell or ASUS, should provide these updates on their support site. After installing the patch and rebooting, your system should block malicious microcode. If you haven’t updated since late 2024, now’s the time to check.

Man using smartphone showing security

What SEV Is and Why It Matters

SEV stands for Secure Encrypted Virtualization. It’s a technology in AMD chips that protects virtual machines from being accessed by outsiders, even the system they run on.

The EntrySign bug could disable this protection if exploited. That risks data in cloud environments where many virtual machines share a physical server. This is a major issue for big companies and services that rely on SEV.

Cloud information data concept

Why the Cloud Isn’t Untouchable

When you store files in the cloud, you trust a server, often powered by chips like AMD’s EPYC line. This flaw could allow attacks on those servers.

If someone with admin access got in, they might load a malicious update that breaks SEV and views protected data. That’s why this bug has serious implications beyond personal devices. Even if your home laptop never sees it, the services you use might.

Bug fix concept.

The Bug’s High Score Explained

The vulnerability was given a 7.2 out of 10 on the CVSS severity scale. That’s not the worst score possible, but it’s considered “high.”

That number comes from the damage the flaw could cause and how hard it is to exploit. Since it requires admin access, it doesn’t score higher, but the risk to deep system functions pushes the number up.

Cropped view of man using laptop with cloud and padlock

How to Protect Your Device Now

To stay safe, visit your PC maker’s support site and look for BIOS or firmware updates. These updates are essential, even if they don’t seem urgent.

Most manufacturers have simple guides for checking and updating your BIOS version. You might also need a SEV firmware patch if your system uses that technology. After updating and restarting, your system will be protected from this specific flaw.

Want to see how other major platforms are being targeted? Don’t miss what’s happening with WhatsApp under siege by Russian hackers.

Hacker tries to enter the system using codes and numbers

Stay Ahead of the Hidden Threats

A microcode-level attack won’t ever target most people. But that doesn’t mean the flaw doesn’t matter. Security is built layer by layer, one of the deepest.

You’re already ahead of the curve by understanding what happened and staying current on updates. Tech evolves fast, and so do threats. Even invisible flaws, like EntrySign, remind us that the tiniest cracks can grow if ignored.

Curious how small slip-ups like this happen in other tech? Check out the shocking truth about website images.

Did this surprise you? Hit like or comment if you’ve ever used an AMD-powered device.

Read More from This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you liked this story, you’ll LOVE our FREE emails. Join today and be the first to get stories like this one.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.